473,767 Members | 2,247 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Access 2002 security

I am creating a database in Access 2002 for a small firm that would
like security on the tables. They want some employees to have write
access only to tables, while others read-only.

I have not done anything with security since way back in version '97.
I'm reading some white papers I've found to gain knowledge of
current security issues.

My question is, can I create security problems with other access
programs I have created as I create users and groups for this new
program? I have a number of small programs I've done for others and
would hate to see that somewhere along the line users or groups pass on
to their databases.

I would not be opening any of the other databases and applying any
security - I just didn't want to fool around with this too much if
I end up causing myself problems in other databases.

If anyone has any links to good sites regarding security for access
2002 that would be helpful as well

Thanks for any insite.

Nov 13 '05 #1
3 1867
If you set up Access User Level Security (ULS) *correctly*
you should not mess up any other Access applications on your
machine or any other user workstations. The key to this process
is creating your own workgroup file and securing your database
with that MDW file. Do not mess with the default system.mdw
that Access uses, otherwise you really are going to cause problems.

You and everyone else will start the secured database application
through a desktop shortcut that tells Access which file you want
to open and *which* workgroup file you want to use. This way,
no other applications are affected and everyone can still make and
modify Access databases.

ULS is a difficult process to set up the first couple of times so
I highly recommend practicing on dummy databases until you
are really comfortable with the process. I would also recommend
that you read all of the ULS information I have accumulated here:

http://www.ltcomputerdesigns.com/JCR....html#Security

Good luck,
--
Jeff Conrad
Access Junkie
Bend, Oregon

"mar10" wrote in message:
news:11******** *************@f 14g2000cwb.goog legroups.com...
I am creating a database in Access 2002 for a small firm that would
like security on the tables. They want some employees to have write
access only to tables, while others read-only.

I have not done anything with security since way back in version '97.
I'm reading some white papers I've found to gain knowledge of
current security issues.

My question is, can I create security problems with other access
programs I have created as I create users and groups for this new
program? I have a number of small programs I've done for others and
would hate to see that somewhere along the line users or groups pass on
to their databases.

I would not be opening any of the other databases and applying any
security - I just didn't want to fool around with this too much if
I end up causing myself problems in other databases.

If anyone has any links to good sites regarding security for access
2002 that would be helpful as well

Thanks for any insite.


----== Posted via Newsfeeds.Com - Unlimited-Uncensored-Secure Usenet News==----
http://www.newsfeeds.com The #1 Newsgroup Service in the World! 120,000+ Newsgroups
----= East and West-Coast Server Farms - Total Privacy via Encryption =----
Nov 13 '05 #2
Thanks for the info and link - I now feel at least a little more secure
about playing around with security -

Nov 13 '05 #3
"mar10"wrot e in message:
news:11******** **************@ o13g2000cwo.goo glegroups.com.. .
Thanks for the info and link - I now feel at least a little more secure
about playing around with security -


You can do it, but just give yourself some time.
You will not "get it" in an hour or two.
It takes time and patience, but when you really
have ULS mastered, it becomes an incredible
tool in your Access arsenal.

Good luck with your project,
--
Jeff Conrad
Access Junkie
Bend, Oregon

----== Posted via Newsfeeds.Com - Unlimited-Uncensored-Secure Usenet News==----
http://www.newsfeeds.com The #1 Newsgroup Service in the World! 120,000+ Newsgroups
----= East and West-Coast Server Farms - Total Privacy via Encryption =----
Nov 13 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

20
4646
by: John | last post by:
Hi, I've recently upgraded from Access 97 to Access 2002 & the performance basically stinks. I have tried the following items listed below but it has only had a minor impact: 1) Upgraded Jet 4 to Service Pack 7 2) Set Subdatasheet Name to from 3) Shortened the file name of the .MDB file 4) Made sure the Track name AutoCorrect info is off
7
2433
by: Campbellbrian | last post by:
I have a database that I thought had fairly tight security applied to it. It's in Access97. I'm running it also on a couple of machines that shipped with Access 2002. This is probably not a good idea, but to avoid rewriting the application I put A97 on the new machines and setup my usual wrkgadm.exe to the .mdw that everyone else was using. However when a user opens Access 2002 it wipes out the directive to the .mdw and they can then open...
3
1698
by: icb | last post by:
Hi I have a front-end/back-end setup. The front-end utilises all unbound forms populating the back-end via the code I have written. All fine so far. Prior to splitting the database I ran the security wizard and used a shortcut from the desktop. All fine except of course I can open the back-end directly. The security FAQ appears to be out of date insofar as there is no wrkgadm.exe with 2002 and therefore you simply run the security...
13
2653
by: Noesis Strategy | last post by:
When I ordered my new laptop, Sony didn't offer Access 2003 in its bundles. Recently, I have begun to design Access databases using an copy of Access 2002 from my previous laptop. It works fine, but I would like to have all the office apps on the same version. So I have a few questions: 1) Is the file format the same as 2002? Can 2002 users read 2003 files? 2) What are the major reasons for upgrading to 2002 ?
2
1849
by: TechBoy | last post by:
I am trying to learn on the fly about Access Security for an app we are developing. I realize Access security is an advanced subject with many details. I wanted to share a scenario and ask a couple of questions. Scenario: I have MyApp.MDB up on a file server. I also have two Client PC's: Client1 and Client2 who use MyApp. (Both Client's are running Access 2002) On Client1's PC:
3
1567
by: TechBoy | last post by:
I had a useracct called xxx123 I had set up. Now there is a problem in that **every single** .mdb file I open now on my PC (regardless of age of the file, location of the file, etc) now asks for that ID and password. So I concluded there was some system file somewhere on my PC that contained some userid/password info that was set up through Tools/Security. (Obviously I did not configure the security correctly...you don't need to scold me...
4
2541
by: RM | last post by:
Had VS .Net 2002 installed on W2k Server SP3 and supported a number of web sites. Installed VS .Net 2003 on Friday and now all web sites using .Net & MS ACCESS get this strange error upon open. ASP=/TestDotNet/AdoNet.aspx System.Data.OleDb.OleDbException: Unspecified error at System.Data.OleDb.OleDbConnection.ProcessResults(Int32 hr) at System.Data.OleDb.OleDbConnection.InitializeProvider() at System.Data.OleDb.OleDbConnection.Open()...
52
9981
by: Neil | last post by:
We are running an Access 2000 MDB with a SQL 7 back end. Our network guy is upgrading to Windows Server 2003 and wants to upgrade Office and SQL Server at the same time. We're moving to SQL Server 2005, and, since he already has licenses for Office Pro 2002, he wants to upgrade to that. I've been saying that we need to upgrade to Access 2003, not 2002, even if Office is kept at 2002. We are also looking to do a fair amount of...
10
2198
by: Walshi | last post by:
Hi all, I'm a relative newby to access and VBA etc. My forms and tables etc are working great and saving lots of time...However... I have two databases with the exact same table format. I want db1 to be used to input data by a remote operator, when she is ready I want her to be able to click a control button to email her new data to db2. This new data will be added to the table in db2 ready for further processing.
0
9571
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10168
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10009
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
8835
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7381
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5279
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5423
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
3929
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
3
2806
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.